Remove Firmware Remove Hacking Remove Penetration Testing Remove Surveillance
article thumbnail

HID Mercury Access Controller flaws could allow to unlock Doors

Security Affairs

access control, video surveillance and mobile credentialing) owned by HVAC giant Carrier. Below is the list of flaws discovered by the researchers: CVE Detail Summary Mercury Firmware Version CVSS Score CVE-2022-31479 Unauthenticated command injection <=1.291 Base 9.0, SecurityAffairs – hacking, HID Mercury Access Controllers).

article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

Criminals may use hijacked drones for illegal surveillance, smuggling, or even as weapons. What are the common firmware and software vulnerabilities in RF devices that can be exploited? Vulnerabilities in RF technology often encompass various weaknesses and security gaps within the firmware and software used in RF devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

FormBook FormBook is an information stealer advertised in hacking forums. Remcos Remcos is marketed as a legitimate software tool for remote management and penetration testing. It has been sold on underground hacker forums for stealing browser data, user credentials, and cryptocurrency information. Enforce MFA.

Malware 82
article thumbnail

APT trends report Q3 2021

SecureList

Upon further investigation we also discovered additional implants deployed through both ShadowPad and ShadowShredder, such as Quarian backdoor, PlugX, Poison Ivy and other hack tools. It is mainly known for being a proprietary commercial penetration testing toolkit officially designed for red team engagements.

Malware 143